Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63227: n/a

0
High
VulnerabilityCVE-2025-63227cvecve-2025-63227
Published: Tue Nov 18 2025 (11/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The Mozart FM Transmitter web management interface on version WEBMOZZI-00287, contains an unrestricted file upload vulnerability in the /patch.php endpoint. An attacker with administrative credentials can upload arbitrary files (e.g., PHP webshells), which are stored in the /patch/ directory. This allows the attacker to execute arbitrary commands on the server, potentially leading to full system compromise.

AI-Powered Analysis

AILast updated: 11/25/2025, 21:05:04 UTC

Technical Analysis

CVE-2025-63227 affects the Mozart FM Transmitter web management interface, specifically version WEBMOZZI-00287. The vulnerability is an unrestricted file upload flaw located in the /patch.php endpoint. This flaw allows an attacker who has administrative credentials to upload arbitrary files, including malicious PHP webshells, to the /patch/ directory on the server. Once uploaded, these files can be executed remotely, enabling the attacker to run arbitrary commands on the underlying system. This can lead to full system compromise, including unauthorized access to sensitive data, modification or destruction of system files, and disruption of service. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and has a CVSS 3.1 base score of 7.2, indicating high severity. The attack vector is network-based, with low attack complexity, but requires high privileges (administrative access) and no user interaction. The scope is unchanged, meaning the impact is limited to the vulnerable component but can affect the entire system's confidentiality, integrity, and availability. No patches or exploit code are currently publicly available, but the risk remains significant due to the potential for remote code execution. Organizations using this product should be vigilant and apply mitigations promptly once patches are released.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of broadcast infrastructure and related systems that use the Mozart FM Transmitter. Successful exploitation could lead to unauthorized control over the transmitter system, potentially disrupting broadcast services or enabling further lateral movement within the network. Confidential data managed by the system could be exposed or altered, and attackers could use the compromised system as a foothold for broader attacks. The requirement for administrative credentials limits the attack surface but does not eliminate risk, especially if credential theft or insider threats are present. Disruption of broadcast services could have regulatory and reputational consequences, particularly in countries with strict media and communication regulations. Additionally, critical infrastructure operators in Europe may face operational impacts and compliance challenges if such vulnerabilities are exploited.

Mitigation Recommendations

1. Immediately restrict access to the web management interface to trusted administrative users and networks using strong authentication and network segmentation. 2. Implement strict file upload validation on the /patch.php endpoint, allowing only expected file types and scanning uploads for malicious content. 3. Employ application-layer firewalls or web application firewalls (WAFs) to detect and block suspicious file upload attempts. 4. Monitor logs for unusual upload activity or execution of unexpected files in the /patch/ directory. 5. Isolate the transmitter management system from critical internal networks to limit potential lateral movement. 6. Enforce strong credential management policies, including multi-factor authentication for administrative access. 7. Regularly audit and update administrative credentials and permissions to minimize risk. 8. Stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available. 9. Conduct penetration testing focused on file upload functionalities to identify similar weaknesses. 10. Educate administrators about the risks of file upload vulnerabilities and safe operational practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691ccaa45990fe54bdf5a3a5

Added to database: 11/18/2025, 7:36:04 PM

Last enriched: 11/25/2025, 9:05:04 PM

Last updated: 1/7/2026, 4:17:13 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats